Bitcoin's Security Model Revisited
نویسندگان
چکیده
We revisit the fundamental question of Bitcoin's security against double spending attacks. While previous work has bounded the probability that a transaction is reversed, we show that no such guarantee can be effectively given if the attacker can choose when to launch the attack. Other approaches that bound the cost of an attack have erred in considering only limited attack scenarios, and in fact it is easy to show that attacks may not cost the attacker at all. We therefore provide a different interpretation of the results presented in previous papers and correct them in several ways. We provide different notions of the security of transactions that provide guarantees to different classes of defenders: merchants who regularly receive payments, miners, and recipients of large one-time payments. We additionally consider an attack that can be launched against lightweight clients, and show that these are less secure than their full node counterparts and provide the right strategy for defenders in this case as well. Our results, overall, improve the understanding of Bitcoin's security guarantees and provide correct bounds for those wishing to safely accept transactions.
منابع مشابه
High level Ab inito bench mark computaions on weak interactions (H2)2 dimer revisited
The Potential Energy Surface PES of (H2)2 dimer has been investigated, using five simple rigid rotor models. These models are called: head to head, symmetric side to side, L , steplike and T model. All calculations were done at two levels of ab initio methods: MP2(Full) and QCISD (T,Full) using cc-pVTZ basis set at singlet state of spin multiplicity. The results of scanning PES were then fitte...
متن کاملPractical Aspects of the Bitcoin System
Digital payment schemes show an ever increasing importance. Out of the countless different schemes available this article focuses on the popular Bitcoin system. The authors provide a description of Bitcoin's unique technological basis and its accompanying ecosystem of users, miners, trading platforms and vendors. Furthermore, this article discusses Bitcoin's currency-like features and the first...
متن کاملBiometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing
Biometric security is a topic of rapidly growing importance, especially as it applies to user authentication and key generation. In this paper, we describe our initial steps toward developing evaluation methodologies for behavioral biometrics that take into account threat models which have largely been ignored. We argue the pervasive assumption that forgers are minimally motivated (or, even wor...
متن کاملSpeed-Security Tradeoffs in Blockchain Protocols
Transaction processing speed is one of the major considerations in cryptocurrencies that are based on proof of work (POW) such as Bitcoin. At an intuitive level it is widely understood that processing speed is at odds with the security aspects of the underlying POW based consensus mechanism of such protocols, nevertheless the tradeo between the two properties is still not well understood. In th...
متن کاملSweep Line Algorithm for Convex Hull Revisited
Convex hull of some given points is the intersection of all convex sets containing them. It is used as primary structure in many other problems in computational geometry and other areas like image processing, model identification, geographical data systems, and triangular computation of a set of points and so on. Computing the convex hull of a set of point is one of the most fundamental and imp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1605.09193 شماره
صفحات -
تاریخ انتشار 2016